CACM - volume 61 - 2018 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Andreas Rossberg Ben L. Titzer Andreas Haas Derek L. Schuff Dan Gohman Luke Wagner Alon Zakai J. F. Bastien Michael Holman
Technical perspective: WebAssembly: a quiet revolution of the web. How to implement any concurrent data structure.Irina Calciu Siddhartha Sen Mahesh Balakrishnan Marcos K. Aguilera
Technical perspective: Node replication divides to conquer. Search-based program synthesis.Rajeev Alur Rishabh Singh Dana Fisman Armando Solar-Lezama
Designing emotionally sentient agents.Daniel J. McDuff Mary Czerwinski
A century-long commitment to assessing artificial intelligence and its impact on society. Uncertainty in current and future health wearables.Bran Knowles Alison Smith-Renner Forough Poursabzi-Sangdeh Di Lu Halimat Alabi
What motivates a citizen to take the initiative in e-participation?: the case of a South Korean parliamentary hearing.Junyeong Lee Jaylyn Jeonghyun Oh
How to get things done when you don't feel like it. Why SRE documents matter. How to live in a post-meltdown and -spectre world.Rich Bennett Craig Callahan Stacy Jones Matt Levine Merrill Miller Andy Ozment
Opportunities and challenges in search interaction. Counterpoint: Regulators should allow the greatest space for AI innovation. Point: Should AI technology be regulated?: yes, and here's how. A chance gardener. Learning machine learning. AI judges and juries. Technology for the deaf. Learning to see. Securing agent 111, and the job of software architect. Reclaim internet greatness. Self-authenticating identifiers.Anh Nguyen Raghda Alqurashi Zohreh Raghebi Farnoush Banaei Kashani Ann C. Halbower Tam Vu
Technical perspective: Making sleep tracking more user friendly. Where did I leave my keys?: lessons from the Juniper Dual EC incident.Stephen Checkoway Jacob Maskiewicz Christina Garman Joshua Fried Shaanan Cohney Matthew Green Nadia Heninger Ralf-Philipp Weinmann Eric Rescorla Hovav Shacham
Technical perspective: Backdoor engineering. Software challenges for the changing storage landscape.Daniel G. Waddington Jim Harris
Modern debugging: the art of finding a needle in a haystack. A look at the design of Lua.Roberto Ierusalimschy Luiz Henrique de Figueiredo Waldemar Celes Filho
Skill discovery in virtual assistants. Tracking and controlling microservice dependencies.Silvia Esparrachiari Tanya Reilly Ashleigh Rentz
Research for practice: knowledge base construction in the machine-learning era.Alexander Ratner Christopher Ré Peter Bailis
Corp to cloud: Google's virtual desktops.Matt Fata Philippe-Joseph Arida Patrick Hahn Betsy Beyer
Will supercomputers be super-data and super-AI machines?Yutong Lu Depei Qian Haohuan Fu Wenguang Chen
Video consumption, social networking, and influence. Is last-mile delivery a 'killer app' for self-driving vehicles? Fintech: AI powers financial services to improve people's lives. Cloud bursting for the world's largest consumer market.Hai Jin Haibo Chen Hong Gao Xiang-Yang Li Song Wu
People logistics in smart cities.Wanli Min Liang Yu Lei Yu Shubo He
Exploiting psychology and social behavior for game stickiness. Can China lead the development of data trading and sharing markets?Xiang-Yang Li Jianwei Qian Xiaoyang Wang
Regional computing culture and personalities. Consumers, corporations, and government: computing in China. The future of artificial intelligence in China.Jun Zhu Tiejun Huang Wenguang Chen Wen Gao
Quantum communication at 7, 600km and beyond.Chao-Yang Lu Cheng-Zhi Peng Jian-Wei Pan
China's computing ambitions. Welcome to the China region special section. Introducing Communications' regional special sections. Crude and rude?Janne Lahtiranta Sami Hyrynsalmi
Using any surface to realize a new paradigm for wireless communications.Christos Liaskos Ageliki Tsioliaridou Andreas Pitsillides Sotiris Ioannidis Ian F. Akyildiz
How machine learning impacts the undergraduate computing curriculum.R. Benjamin Shapiro Rebecca Fiebrink Peter Norvig
The big picture. The EU's controversial digital single market directive. Weighing the impact of GDPR. A new movement in seismology. AI, explain yourself. The gap in CS, mulling irrational exuberance. Self-reference and section 230. The upper layers of the internet.Robert Gerstenberger Maciej Besta Torsten Hoefler
Technical perspective: The future of MPI. Fundamental concepts of reactive control for autonomous drones. Technical perspective: A control theorist's view on reactive control for autonomous drones. Computing within limits.Bonnie A. Nardi Bill Tomlinson Donald J. Patterson Jay Chen Daniel Pargman Barath Raghavan Birgit Penzenstadler
The productivity paradox in health information technology.Quang Sean Hansen Manlu Liu Qiang Tu
Formally verified software in the real world.Gerwin Klein June Andronick Matthew Fernandez Ihor Kuz Toby C. Murray Gernot Heiser
Human-level intelligence or animal-like abilities? Mind your state for your state of mind. The secret formula for choosing the right next role. The mythos of model interpretability. Are CS conferences (too) closed communities?Jordi Cabot Javier Luis Cánovas Izquierdo Valerio Cosentino
Building the universal archive of source code. The obscene coupling known as spaghetti code. A pedagogic cybersecurity framework. The business of quantum computing. The dangers of automating social programs. Transient electronics take shape. Floating voxels provide new hope for 3D displays. Can we use AI for global good? Hennessy and Patterson on the roots of RISC. The internet in the 21st century.Mingmin Zhao Fadel Adib Dina Katabi
Technical perspective: Is your WiFi a sensor? An overview of deterministic database systems.Daniel J. Abadi Jose M. Faleiro
Peer assessment of CS doctoral programs shows strong correlation with faculty citations.Slobodan Vucetic Ashis Kumar Chanda Shanshan Zhang Tian Bai Aniruddha Maiti
Can beyond-CMOS devices illuminate dark silicon?Robert Perricone Xiaobo Sharon Hu Joseph Nahas Michael T. Niemier
A domain-specific architecture for deep neural networks.Norman P. Jouppi Cliff Young Nishant Patil David A. Patterson
Research for practice: FPGAs in datacenters. Workload frequency scaling law: derivation and verification. GitOps: a path to more self-service IT. Is software the result of top-down intelligent design or evolution? An academic's observations from a sabbatical at Google. Navigating with accelerating technology change. When machine learning is facially invalid. Overtrust in the robotic age. Borders in the cloud. Robotic implants. AI holds the better hand. Discovering bugs, or ensuring success? Hippie values really did build the internet. Move fast and break things. The peace of westphalia. Computer architecture: disruption from above.Adam McLaughlin David A. Bader
Technical perspective: Graphs, betweenness centrality, and the GPU. Multiparty privacy in social media. Amdahl's law for tail latency.Christina Delimitrou Christos Kozyrakis
How to teach computer ethics through science fiction.Emanuelle Burton Judy Goldsmith Nicholas Mattei
Consistently eventual. Research for practice: prediction-serving systems. Algorithms behind modern storage systems. Counterpoint: e-democracy won't save democracy. democracy will save democracy. Point: foundations of e-democracy. Every silver lining has a cloud. Providing equitable access to computing education. Designing sustainable rural infrastructure through the lens of OpenCellular. Session details: Global computing. Broadening the path for women in STEM. Electronics are leaving the plane. Animals teach robots to find their way. Assessing responsibility for program output. Encourage ACM to address U.S. election integrity. Traceability. Regulating automated decision making.Christoph Schneider Markus Weinmann Jan vom Brocke
Making machine learning robust against adversarial inputs.Ian J. Goodfellow Patrick D. McDaniel Nicolas Papernot
Research for practice: toward a network of connected things. How to come up with great ideas. C is not a low-level language. The case for disappearing cyber security. A new perspective on computational thinking. Beyond diversity. Session details: Broadening participation. Blockchain revolution without the blockchain? Session details: Economic and business dimensions. Copyright blocks a news-monitoring technology. Bringing the internet to the (developing) world. You've got mail! Why cryptocurrencies use so much energy: and what to do about it. We are done with 'hacking'. Teach the law (and the AI) 'foreseeability'. How the hippies destroyed the internet. On neural networks. Reflections on my two years.Charlie Curtsinger Emery D. Berger
Technical perspective: Measuring optimization potential with Coz. Privacy in decentralized cryptocurrencies.Daniel Genkin Dimitrios Papadopoulos Charalampos Papamanthou
Identifying patterns in medical records through latent semantic analysis.David Gefen Jake Miller Johnathon Kyle Armstrong Frances H. Cornelius Noreen Robertson Aaron Smith-McLallen Jennifer A. Taylor
Ability-based design.Jacob O. Wobbrock Krzysztof Z. Gajos Shaun K. Kane Gregg C. Vanderheiden
Bias on the web. Documentation is automation. Thou shalt not depend on me.Tobias Lauinger Abdelberi Chaabane Christo Wilson
Designing cluster schedulers for internet-scale services.Diptanu Gon Choudhury Timothy Perrett
Effectiveness of anonymization in double-blind review.Claire Le Goues Yuriy Brun Sven Apel Emery D. Berger Sarfraz Khurshid Yannis Smaragdakis
Watchdogs vs. snowflakes. An interview with Dave Parnas. Risks of cryptocurrencies. Getting hooked on tech. 3D sensors provide security, better games. Deep learning hunts for signals among the noise. Rewarded for RISC. Programming programming languages, and analyzing Facebook's failure. When to hold 'em. Celebrating excellence.Tom M. Mitchell William W. Cohen Estevam R. Hruschka Jr. Partha P. Talukdar Bo Yang Justin Betteridge Andrew Carlson Bhavana Dalvi Mishra Matt Gardner Bryan Kisiel Jayant Krishnamurthy Ni Lao Kathryn Mazaitis Thahir Mohamed Ndapandula Nakashole Emmanouil A. Platanios Alan Ritter Mehdi Samadi Burr Settles Richard C. Wang Derry Wijaya Abhinav Gupta Xinlei Chen Abulhair Saparov Malcolm Greaves Joel Welling
Technical perspective: Breaking the mold of machine learning. Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends. Data acquisition in vehicular ad hoc networks. Internet freedom in West Africa: technical support for journalists and democracy advocates.Richard R. Brooks Lu Yu Yu Fu Oluwakemi Hambolu John Gaynard Julie Owono Archippe Yepmou Felix Blanc
More than the code: learning rules of rejection in writing programs.Josh Tenenberg Wolff-Michael Roth Donald Chinn Alfredo Jornet David Socha Skip Walter
How is your week going so far? Canary analysis service. Research for practice: cluster scheduling for datacenters.Malte Schwarzkopf Peter Bailis
Science, policy, and service. The march into the black hole of complexity.Scale or fail. Putting trust in security engineering. Is the law ready for driverless cars? Finding a healthier approach to managing medical data. Using functions for easier programming. Shrinking machines, cellular computers. Commenting on code, considering data's bottleneck. ACM's 2018 general election: please take this opportunity to vote. Get ACM (and Communications) out of politics. How we lost the women in computing. Toward sustainable access: where are we now?
Jack W. Davidson Joseph A. Konstan Andrew A. Chien Scott Delman
Turing test 2.Sanjeev Arora Rong Ge Yoni Halpern David M. Mimno Ankur Moitra David A. Sontag Yichen Wu Michael Zhu
Technical perspective: Expressive probabilistic models and scalable method of moments. Bridgeware: the air-gap malware. Realizing the potential of data science.Francine Berman Rob A. Rutenbar Brent Hailpern Henrik Christensen Susan Davidson Deborah Estrin Michael J. Franklin Margaret Martonosi Padma Raghavan Victoria Stodden Alexander S. Szalay
Lessons from building static analysis tools at Google.Caitlin Sadowski Edward Aftandilian Alex Eagle Liam Miller-Cushon Ciera Jaspan
Building a smart city: lessons from Barcelona. DevOps metrics. Containers will not fix your broken culture (and other hard truths). Continuous delivery sounds great, but will it work here? DevOps delivers. Smartphones, contents of the mind, and the fifth amendment. Push versus pull. Popping kernels. Business ecosystems: how do they matter for innovation? Artificial (emotional) intelligence. Chips for artificial intelligence. Always out of balance. Fostering inclusion, keeping the net neutral. Predicting failure of the university. Open access and ACM. The sound of programming. Go big!Liang Zhang David R. Choffnes Tudor Dumitras Dave Levin Alan Mislove Aaron Schulman Christo Wilson
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. Time-inconsistent planning: a computational problem in behavioral economics. Technical perspective: A graph-theoretic framework traces task planning. How can we trust a robot? Evolution toward soft(er) products. The wisdom of older technology (non)users. A programmable programming language.Matthias Felleisen Robert Bruce Findler Matthew Flatt Shriram Krishnamurthi Eli Barzilay Jay A. McCarthy Sam Tobin-Hochstadt
Monitoring in a DevOps world. Operational excellence in April Fools' pranks. Bitcoin's underlying incentives.Yonatan Sompolinsky Aviv Zohar
Computational social science ≠ computer science + social data. Responsible research with crowds: pay crowdworkers at least minimum wage.M. Six Silberman Bill Tomlinson R. LaPlante Joel Ross Lilly Irani Andrew Zaldivar
Impediments with policy interventions to foster cybersecurity. The computing profession. Ethics omission increases gases emission. Will the Supreme Court nix reviews of bad patents? Making security sustainable. The state of fakery. The construction industry in the 21st century. In pursuit of virtual life. The costs and pleasures of a computer science teacher. Keep the ACM code of ethics as it is.A declaration of the dependence of cyberspace. Unintended consequences. Here comes everybody...to Communications.
Kobi Gal Ariel D. Procaccia Moshe Mash Yair Zick
Technical perspective: Designing algorithms and the fairness criteria they should satisfy. Practical verification of peephole optimizations with Alive.Nuno P. Lopes David Menendez Santosh Nagarakatte John Regehr
Technical perspective: Building bug-free compilers. Elements of the theory of dynamic networks.Othon Michail Paul G. Spirakis
A large-scale comparative study of beta testers and regular users.Vlasta Stavova Lenka Dedkova Martin Ukrop Vashek Matyas
The next phase in the digital revolution: intelligent tools, platforms, growth, employment. Views from the top. Research for practice: private online communication; highlights in systems verification.Albert Kwon James R. Wilcox Peter Bailis
Titus: introducing containers to the Netflix cloud.Andrew Leung Andrew Spyker Tim Bozarth
Innovation from the edges. Teaching artificial intelligence and humanity.Jennifer Keating Illah R. Nourbakhsh
Reducing the attack surface. The inclusive and accessible workplace.Sarah Wille Daphne Sajous-Brady
Risks of trusting the physics of sensors. The war over the value of personal data. Going serverless. Quantum technology forgoes unconditional security to extend its reach. Protecting the power grid, and finding bias in student evaluations. Toward an equation that anticipates AI risks.A comprehensive self-driving car test. Achieving gender equity: ACM-W can't do it alone.
Don Gotterbarn Amy Bruckman Catherine Flick Keith W. Miller Marty J. Wolf
Polychromatic choreography. Halide: decoupling algorithms from schedules for high-performance image processing.Jonathan Ragan-Kelley Andrew Adams Dillon Sharlet Connelly Barnes Sylvain Paris Marc Levoy Saman P. Amarasinghe Frédo Durand
Technical perspective: Can high performance be portable? Deep optimization for spectrum repacking.Neil Newman Alexandre Fréchette Kevin Leyton-Brown
Technical perspective: Moving spectrum. Information hiding: Challenges for forensic experts.Wojciech Mazurczyk Steffen Wendzel
Decentralized blockchain-based electronic marketplaces. Popularity spikes hurt future chances for viral propagation of protomemes. Cache me if you can. Abstracting the geniuses away from failure testing. Network applications are interactive. Ask not what your postdoc can do for you ...Chitta Baral Shih-Fu Chang Brian Curless Partha Dasgupta Julia Hirschberg Anita Jones
Technology and the failure of the university. Defining American greatness: IBM from Watson to Trump. How law and computer science can work together to improve the information society. The sharing economy meets reality. The new jobs. Smartphone science. Feeling sounds, hearing sights. The big IDEA and the PD pipeline. A leap from artificial to intelligence.Computer professionals for social responsibility. The role of archives in digital preservation.